Sciweavers

1369 search results - page 60 / 274
» A Practical Implementation of the Timing Attack
Sort
View
CHES
2007
Springer
327views Cryptology» more  CHES 2007»
15 years 5 months ago
On the Power of Bitslice Implementation on Intel Core2 Processor
Abstract. This paper discusses the state-of-the-art fast software implementation of block ciphers on Intel’s new microprocessor Core2, particularly concentrating on “bitslice i...
Mitsuru Matsui, Junko Nakajima
AIIDE
2008
15 years 1 months ago
The Rise of Potential Fields in Real Time Strategy Bots
Bots for Real Time Strategy (RTS) games are challenging to implement. A bot controls a number of units that may have to navigate in a partially unknown environment, while at the s...
Johan Hagelbäck, Stefan J. Johansson
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
16 years 10 days ago
Design, Implementation, and Evaluation of a Repairable Database Management System
Although conventional database management systems are designed to tolerate hardware and to a lesser extent even software errors, they cannot protect themselves against syntactical...
Tzi-cker Chiueh, Dhruv Pilania
NDSS
2005
IEEE
15 years 4 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
ACNS
2006
Springer
117views Cryptology» more  ACNS 2006»
15 years 5 months ago
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side hash functions used to shorten the documents befo...
Ahto Buldas, Sven Laur